BOOKS - NETWORK TECHNOLOGIES - Security, Privacy and Reliability in Computer Communic...
Security, Privacy and Reliability in Computer Communications and Networks - Kewei Sha 2017 PDF River Publishers BOOKS NETWORK TECHNOLOGIES
ECO~14 kg CO²

1 TON

Views
10516

Telegram
 
Security, Privacy and Reliability in Computer Communications and Networks
Author: Kewei Sha
Year: 2017
Pages: 200
Format: PDF
File size: 37 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

Ultimate Penetration Testing with Nmap Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
The Refugee Crisis and Religion: Secularism, Security and Hospitality in Question (Critical Perspectives on Religion in International Politics)
The Scarcity Slot: Excavating Histories of Food Security in Ghana (California Studies in Food and Culture Book 75)
Python Programming This Book Includes Python Programming For Beginners + Tips And Tricks + Data Science Learn Computer Languages in One Day Effectively (#2020 Version)
WALCOM: Algorithms and Computation: 17th International Conference and Workshops, WALCOM 2023, Hsinchu, Taiwan, March 22-24, 2023, Proceedings (Lecture Notes in Computer Science)
Computational Science and Its Applications - ICCSA 2023 Workshops: Athens, Greece, July 3-6, 2023, Proceedings, Part III (Lecture Notes in Computer Science, 14106)
Geometric Science of Information: 5th International Conference, GSI 2021, Paris, France, July 21-23, 2021, Proceedings (Lecture Notes in Computer Science, 12829)
Artificial Intelligence Application in Networks and Systems: Proceedings of 12th Computer Science On-line Conference 2023, Volume 3 (Lecture Notes in Networks and Systems, 724)
Frontiers of Algorithmic Wisdom: International Joint Conference, IJTCS-FAW 2022, Hong Kong, China, August 15-19, 2022, Revised Selected Papers (Lecture Notes in Computer Science Book 13461)
Machine Learning and Data Mining for Sports Analytics: 9th International Workshop, MLSA 2022, Grenoble, France, September 19, 2022, Revised Selected … in Computer and Information Science, 1783)
Benchmarking, Measuring, and Optimizing: 14th BenchCouncil International Symposium, Bench 2022, Virtual Event, November 7-9, 2022, Revised Selected Papers … Notes in Computer Science Book 13852)
Terrorism in Pakistan: The Tehreek-e-Taliban Pakistan (TTP) and the Challenge to Security (International Library of Twentieth Century History)
Atomic Assistance: How and quot;Atoms for Peace and quot; Programs Cause Nuclear Insecurity (Cornell Studies in Security Affairs)
Mastering Cloud Storage Navigating cloud solutions, data security, and cost optimization for seamless digital transformation
Open-Source Security Operations Center (SOC) A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (Final Release)
Back Channel Negotiation: Security in Middle East Peace Process (Syracuse Studies on Peace and Conflict Resolution)
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation
Mastering Cloud Storage Navigating cloud solutions, data security, and cost optimization for seamless digital transformation
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, Second Edition (Final Release)
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs Exam SY0-501
Practical Mathematics for AI and Deep Learning: A Concise yet In-Depth Guide on Fundamentals of Computer Vision, NLP, Complex Deep Neural Networks and Machine Learning (English Edition)
Learn OpenCV with Python by Examples Implement Computer Vision Algorithms Provided by OpenCV with Python for Image Processing, Object Detection and Machine Learning 2nd Edition
Big Data and Social Computing: 8th China National Conference, BDSC 2023, Urumqi, China, July 15-17, 2023, Proceedings (Communications in Computer and Information Science)
Computer Programming for Beginners 4 Books in 1 LINUX COMMAND-LINE + PYTHON Programming + NETWORKING + HACKING with KALI LINUX. Cybersecurity, Wireless, LTE, Networks, and Penetration Testing
Freedom from Fear, Freedom from Want: An Introduction to Human Security
SAP System Security Guide (SAP PRESS)
Wireshark for Security Professionals Using Wireshark and the Metasploit Framework
Deadly Rescue (Agile Security and Rescue Book 2)
Danger Trail: Trail of Evidence Security Breach
Fault Analysis in Cryptography (Information Security and Cryptography)
Software Security Building secure software applications
Raspberry Pi A Beginners Guide with Over 20 Projects for the Pocket-Sized Computer Projects for the Raspberry Pi 2, B+ and A+
ZERO TRUST SECURITY DEMYSTIFIED: Expert Insights, Proven Strategies, and Real World Implementations for Digital Defense: Your Roadmap to a Resilient Network and Unparalleled Data Protection
Neural Information Processing: 29th International Conference, ICONIP 2022, Virtual Event, November 22-26, 2022, Proceedings, Part IV (Communications in Computer and Information Science Book 1791)
Soft Computing in Data Science: 7th International Conference, SCDS 2023, Virtual Event, January 24-25, 2023, Proceedings (Communications in Computer and Information Science Book 1771)
Computer Programming Basics for Absolute Beginners Learn from the basics to advanced of Python, php, C++, C#, html and css, java, javascript, SQL Step-by-Step in No Time!
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap (English Edition)
Social Security Programs and Retirement around the World: Reforms and Retirement Incentives (National Bureau of Economic Research Conference Report)
Learning Kali Linux Security Testing, Penetration Testing & Ethical Hacking, 2nd Edition (Early Release)